HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

VolWeb helps investigators extract data from memory images, simplifies forensics. LDAP Watchdog monitors changes in LDAP entries, sends alerts through Slack, and skips some attributes. CVE-2024-3094, a cybersecurity flaw, learned to detect the xz backdoor, updating systems to keep safe. NetScout is a tool for OSINT to dig into URL-related data. Sophisticated UNAPIMON malware evades detection, suggesting better security steps. Root access on macOS gained by filesystem mount tweak now patched. OCEANMAP backdoor used by APT28, allows remote manipulation. Generate Cobalt Strike beacons on Linux with CrossC2. Hakoriginfinder figures out the original hosts behind proxies. Evilginx 3.3 works with GoPhish, improves phishing campaigns. PowerShell DFIR scripts help in cyber defense on Kali Linux site. Use Gitrecon for info from GitHub/GitLab, and guard private data. Bishop Fox's Cosmos provides penetration testing. Windows shortcuts and SSH can be phished, yet detectable. DOMPurify bypass found, corrected later. Linodas, a Linux malware, hides well thus harder to detect. IceID malware leads to Nokoyawa ransomware in an attack. Dell server has a fixable privilege escalation. RouterOS DoS exploit works with malformed SMB packets. SQL-BOF library handles SQL interaction. "Rebound" VM on HackTheBox teaches cyberattacks-crack hashes, cycle RIDs. Nothing from a 404 error page. EDR systems' anti-tampering disabled by communication interception. Vulnerability in EDR product by unprotected processes found. Jan gives an offline AI. Rust ransomware making demonstrated for learning, not misuse. Nidhogg rootkit performs stealth operations in Windows without detection. Malicious script in xz utility's build could hijack functions, requires careful updates. Wireproxy is a userspace WireGuard, offering socks5/http proxy capabilities.

# Tradecraft

[#] VolWeb is a centralized web application that uses Volatility 3 to automatically process and extract artifacts from forensic memory images for more efficient digital investigations.
Read More @ kitploit.com
[#] LDAP Watchdog is a Python-based, real-time LDAP directory monitoring tool that tracks user and group entry changes, integrates with Slack for notifications, and can be customized to ignore certain attributes.
Read More @ securityonline.info
[#] The document details a cybersecurity issue involving the xz backdoor (CVE-2024-3094) and provides a demonstration on how to detect exploit attempts with a honeypot, patch a system using an ED448 key, decrypt and analyze payloads, and execute commands on compromised systems.
Read More @ github.com
[#] NetScout is an OSINT tool that can be used to find domains, subdomains, directories, endpoints, and files related to a specific URL by using a variety of techniques including DNS zone transfers and Google dorking.
Read More @ github.com
[#] Cybersecurity experts identified a sophisticated malware called UNAPIMON used by Earth Freybug attackers to unhook critical APIs and evade detection, necessitating good security practices like frequent password updates and limiting administrative access.
Read More @ trendmicro.com
[#] A security researcher found a way to gain root access on macOS by manipulating the mount options of the filesystem, which Apple has since patched in the latest updates of macOS Sonoma, Ventura, and Monterey.
Read More @ alter-solutions.fr
[#] The OCEANMAP backdoor is a C# malware used by APT28 to maintain persistence, receive commands via IMAP, and exfiltrate data to a C2 server, with capabilities for remote configuration updates and tailored command execution.
Read More @ medium.com
[#] The blog post details how to use the CrossC2 framework to generate Cobalt Strike beacons for Linux systems, install necessary tools, create listeners, and operate the new beacon payloads.
Read More @ injectexp.dev
[#] Hakoriginfinder is a tool that identifies the original host of a website hidden behind a reverse proxy by comparing server responses to find matches.
Read More @ github.com
[#] Evilginx 3.3 integrates with GoPhish for enhanced email phishing campaigns, enabling user-specific tracking and easing the process with a user-friendly interface while supporting custom TLS certificates and recognizing origin IP behind proxies.
Read More @ breakdev.org
[#] The Kali Linux website details a suite of PowerShell scripts dedicated to Digital Forensics and Incident Response (DFIR) on Windows systems, aiding in the collection, analysis, and management of forensic data to bolster cyber defense.
Read More @ kalilinuxtutorials.com
[#] Gitrecon is an OSINT tool used to extract information, such as leaked email addresses, from GitHub and GitLab profiles by analyzing public commit data, and it includes instructions for users to safeguard their private information.
Read More @ github.com
[#] Bishop Fox's Cosmos services offer offensive security solutions, including attack surface management and penetration testing, designed to proactively defend organizations by identifying and addressing vulnerabilities in their external attack surface, applications, and networks.
Read More @ bishopfox.com
[#] Hackers can exploit Windows shortcuts and the built-in SSH client to create stealthy phishing attacks and establish reverse connections, but these attacks can be detected with specific security rules.
Read More @ redsiege.com
[#] A security engineer discovered ways to bypass DOMPurify's sanitation by exploiting inconsistencies in XML/HTML parsing, which were resolved by subsequent patches that remove problematic nodes.
Read More @ flatt.tech
[#] Check Point Research has analyzed Linodas, a mature Linux version of DinodasRAT, which shows the evolution of malware with capabilities tailored for Linux servers, including a separate evasion module to hide its presence, offering insights for better detection and prevention of such threats.
Read More @ checkpoint.com
[#] [tag] In an intrusion that began with a phishing attack using a OneNote document, attackers installed IceID malware, persisted for over a month, and eventually escalated to deploying Nokoyawa ransomware on a file and backup server.
Read More @ thedfirreport.com
[#] Dell Security Management Server versions before 11.9.0 have a privilege escalation vulnerability due to weak directory permissions, which can be fixed by updating to the latest version.
Read More @ packetstormsecurity.com
[#] A Python script has been released that exploits a denial of service vulnerability in RouterOS versions 6.40.5 through 6.44 and 6.48.1 through 6.49.10, identified by CVE-2024-27686, by sending malformed packets to the SMB service.
Read More @ packetstormsecurity.com
[#] The SQL-BOF library includes beacon object files for interacting with SQL servers, offering commands for tasks such as executing queries, managing server settings, and gathering information about databases and user permissions.
Read More @ github.com
[#] The blog post discusses the use of HackTheBox's "Rebound" virtual machine, exploring various cyberattack methods, such as RID cycling, AS-REP roasting, BloodHound analysis, and multiple techniques for relaying and cracking NTLM hashes to ultimately gain administrative access to the system.
Read More @ gitlab.io
[#] It seems there has been an error, and the content you provided is actually a 404 error page, meaning the resource is not available or does not exist. Therefore, I'm unable to summarize any cybersecurity content from this source. If you have specific cybersecurity topics from Martin Hellman or my parent's work that you would like summarized, please provide that and I'd be happy to help.
Read More @ github.io
[#] Researchers demonstrated a method to disable the anti-tampering feature of an EDR system by intercepting and altering its check-in communication with the management tenant.
Read More @ github.io
[#] Riccardo Ancarani and Devid Lana found a vulnerability in a top-tier Endpoint Detection and Response (EDR) product by exploiting unprotected processes which allowed post-exploitation tactics without detection, highlighting the need for better security practices in EDR systems.
Read More @ github.io
[#] Jan is an open source software project providing an offline alternative to ChatGPT, enabling AI functionality directly on your computer, and supports various hardware architectures and operating systems.
Read More @ github.com
[#] Security researcher Ido Veltzman demonstrates a basic example of creating ransomware using the Rust programming language to encrypt and decrypt files, emphasizing that this educational content is not for malicious use.
Read More @ github.io
[#] Nidhogg is a comprehensive and multifunctional rootkit for Windows 10 and 11 that can perform a series of covert operations such as process and thread hiding, credential dumping, and registry manipulation without registering callbacks to avoid PatchGuard detection.
Read More @ github.com
[#] The document details a cybersecurity issue involving the xz backdoor (CVE-2024-3094) and provides a demonstration on how to detect exploit attempts with a honeypot, patch a system using an ED448 key, decrypt and analyze payloads, and execute commands on compromised systems.
Read More @ github.com
[#] A malicious script and object file injected into the xz compression utility's build process on Linux, using subtle alterations and hidden executable code, compromise the system by hijacking the RSA_public_decrypt function to run attacker code, which requires scrutiny of build scripts and updates to avoid.
Read More @ swtch.com
[#] Wireproxy is a userspace application that acts as a WireGuard client, providing a socks5/http proxy or tunnels to route traffic through a WireGuard peer without needing root permissions.
Read More @ github.com

# News

[#] Microsoft's Clint Watts warns that AI manipulation in elections is a rising threat, with simple techniques like adding credible logos to images for widespread sharing, and audio fakes lacking context as challenging issues for validating authenticity.
Read More @ theregister.com
[#] Russian authorities have charged six individuals accused of using malware to steal credit card information from online stores and selling the data on dark web markets.
Read More @ bleepingcomputer.com
[#] Apache Pulsar has fixed a critical authorization flaw identified as CVE-2024-29834, and users should update to versions 3.0.4, 3.2.2, or later to protect their data.
Read More @ securityonline.info
[#] Polish officials may face charges for using Pegasus spyware to unlawly surveil opposition and the justice minister asserts victims will be informed soon.
Read More @ theregister.com
[#] INC Ransom has claimed they launched a cyberattack against Leicester City Council, allegedly stealing and then flashing 3 TB of data on their leak site to pressure the council after initial silence during ransom negotiations.
Read More @ theregister.com
[#] A vulnerability in IBIS Budget hotel check-in terminals that leaked room codes has been fixed after being reported to the operator Accor and going through a coordinated disclosure process.
Read More @ pentagrid.ch
[#] MarineMax, a major boat and yacht retailer, confirms personal data breach following a March cyberattack by Rhysida ransomware group, with stolen data for sale on the dark web.
Read More @ bleepingcomputer.com
[#] AT&T has confirmed a data breach affecting 73 million records, including 7.6 million current customers, and recommends affected individuals change their passcodes and monitor their credit.
Read More @ scmagazine.com
[#] Google has implemented tougher anti-spam measures requiring bulk email senders to authenticate with SPF/DKIM and DMARC, provide easy unsubscribe options, and limit spam rates, with non-compliant emails possibly being blocked starting April 2024.
Read More @ bleepingcomputer.com
[#] JumpServer versions from v3.0.0 to v3.10.6 have two critical remote code execution vulnerabilities, CVE-2024-29201 and CVE-2024-29202; upgrading to v3.10.7 or disabling the Job Center feature is recommended to mitigate risks.
Read More @ securityonline.info
[#] Qualcomm has issued a security bulletin for April, addressing one critical vulnerability with a CVSS score of 9.8, affecting a wide range of chipsets, and 11 high-severity issues that could compromise device memory and user data, with users urged to update their devices promptly.
Read More @ securityonline.info
[#] Apple's GoFetch vulnerability results from the Data Memory Prefetcher revealing cryptographic keys, highlighting a conflict between chip performance and security, with a call for more transparency among chip manufacturers to enhance security and optimize code.
Read More @ theregister.com
[#] The US House of Representatives has prohibited the use of Microsoft's Copilot and related AI productivity tools until a government-approved version is released, due to concerns about data privacy and security breaches.
Read More @ theregister.com
[#] The online shopping platform PandaBuy suffered a data breach, with threat actors claiming to have leaked over 1.3 million customer records, including personal details and order data, and the incident's validity has been confirmed by Have I Been Pwned founder Troy Hunt.
Read More @ securityaffairs.com
[#] Singapore introduces a collaborative application named COSMIC to combat money laundering and terrorism financing, co-developed with six major banks, while ASEAN countries face cyber espionage threats from two Chinese hacker groups, among other regional technology and security developments.
Read More @ theregister.com
[#] The OWASP Foundation reported a data breach affecting member resumes from 2006-2014 due to a misconfigured web server, and they have secured the data and notified affected members.
Read More @ securityaffairs.com
[#] TA558, a threat group active since 2018, launched a widespread phishing campaign in Latin America using Venom RAT to target various sectors and steal sensitive data.
Read More @ thehackernews.com
[#] Google has agreed to a lawsuit settlement to delete users' private browsing data and improve its Incognito Mode disclosures, and has also taken steps to reduce spam and phishing by updating Gmail sender guidelines.
Read More @ thehackernews.com
[#] Multiple cryptocurrency platforms and games such as LENX, KuCoin, Munchables, Curio, Lucky Star Currency, and Dolomite have recently suffered security breaches and thefts, resulting in substantial financial losses, while others, like the TICKER project and AirDAO, were victims of scams that exploited trust and technical vulnerabilities.
Read More @ web3isgoinggreat.com
[#] The Indian government successfully extracted 250 citizens from cybercrime conditions in Cambodia, with ongoing efforts to rescue more from a scam operation yielding $60 million in six months.
Read More @ bleepingcomputer.com
[#] Recent global elections show a surge in the use of artificial intelligence for creating deepfakes and disinformation, impacting trust in democratic processes and highlighting the need for improved regulations and media literacy.
Read More @ checkpoint.com
[#] In February 2023, cybersecurity researchers reported an IcedID malware campaign using Microsoft OneNote files to bypass email security, leading to data exfiltration and deployment of Nokoyawa ransomware on compromised servers over a 34-day period.
Read More @ thedfirreport.com
[#] Security researchers identified malicious activity using AWS CloudTrail, where attackers tried to enumerate SMS settings with stolen keys before executing a phishing campaign, and AWS users are urged to monitor SNS service API calls and rotate access keys regularly to prevent similar incidents.
Read More @ datadoghq.com
[#] The message indicates that the GitHub Pages site you are trying to access does not exist, and the solution is to consult the full documentation to properly set up GitHub Pages for your repository, organization, or user account.
Read More @ github.io
[#] Rapid7's Managed Detection and Response team identified a new malware loader named IDAT Loader that retrieves data from PNG files to execute additional malware, indicating a rise in sophisticated cyber attacks which necessitates the use of updated detection rules and proactive monitoring systems.
Read More @ rapid7.com
[#] A critical security vulnerability affecting xz-utils, known as CVE-2024-3094, was identified and involves a backdoor that impacts certain Linux and macOS systems, and users should update their systems immediately to mitigate the risk.
Read More @ github.com
[#] Imperva's latest research reveals that attackers can exploit AI chat interfaces, such as ChatGPT, through Cross-Site Scripting to access user data and manipulate responses, with new measures by Imperva making large-scale data theft more difficult.
Read More @ imperva.com
[#] The xz compression utility from upstream sources has been backdoored, resulting in ssh server slowdowns, and multiple Linux distributions are affected; users should update their systems immediately to address this critical security vulnerability identified as CVE-2024-3094.
Read More @ openwall.com
[#] CyberArk delves into the prevalence of cookie-stealing malware, and reinforces the importance of security practices and tools like the CyberArk Secure Browser to guard against information theft in digital environments.
Read More @ cyberark.com
[#] A security researcher discovered a misconfigured Jenkins server on a South Korean Azure instance, leading to unauthorized access to Samsung's internal code repositories and infrastructure configurations, which was later responsibly reported and fixed by Samsung.
Read More @ crimew.gay
[#] A long-term, systematic attack on the xz compression library culminated in a backdoor that enabled unauthenticated remote code execution via OpenSSH on multiple Linux distributions, which was detected and disclosed, leading to a reversal of the compromised updates.
Read More @ swtch.com

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-04-03

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins